Risk tolerance and current risk levels

Assignment Help Computer Network Security
Reference no: EM132713218

MIS607 Cybersecurity - Laureate International Universities

Mitigation Plan for Threat Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary
For this assessment, you are required to write a 2500 words mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment 2 case as context to write a report to address or alleviate problems faced by the business and to protect the customers. In doing so, you are required to demonstrate your ability to mitigate threat/risks identified in Assessment 2 through the strategy you recommend (STRIDE).

Context
Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation.

Task Instructions
1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report.

3. The mitigation plan for threat report should address the following:
• Setting priorities for risks/threats
• Analyse the case in terms of identified risk categories and scenarios
• Apply standard mitigations
• Discuss specific resolutions for improvement, and justify their significance
• Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats)
• Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline.

4. The report should consist of the following structure:
A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of:
a) Your area of research and its context (how to mitigate or manage threats)
b) The key concepts you will be addressing
c) What the reader can expect to find in the body of the report

The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report.

The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA referencing style

Attachment:- Mitigation Plan for Threat Report.rar

Reference no: EM132713218

Questions Cloud

What accounts are affected by these transactions : What accounts are affected by these transactions? How much is debited and credited? For transactions in Jun 2020
Which plan is better for the firm shareholders : Assuming the rights issue is successful, how much money will it raise? What will the share price be after the rights issue? Which plan is better for the firm's
How are budget variances reported in workplace : How are budget variances reported in your workplace or training environment? ?What should you do when you identify an area of underperformance?
Determine the amount of net income allocated to each partner : Each partner withdrew $1,000 per month throughout 2020 and 2021. Determine the amount of net income allocated to each partner for 2020
Risk tolerance and current risk levels : Mitigation Plan for Threat Report - Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Calculate the best-case and worst-case npv figures : Given for price, quantity, variable costs, and fixed costs are all accurate to within ±10 percent. Calculate the best-case and worst-case NPV figures.
What is the annual operating cash flow : What is the annual operating cash flow? (Do not round intermediate calculations and round your answer to the nearest whole number, e.g., 32.)
What are the necessary consolidation entries for a January : On January 2, 2020 Davis Corp. purchased all of Kuehler's common stock for $900,000 cash. What are the necessary consolidation entries for a January
Calculate the aftertax salvage value for the equipment : Calculate the aftertax salvage value for the equipment at the end of the project. (Do not round intermediate calculations and round your answer)

Reviews

len2713218

11/28/2020 4:30:31 AM

I will be forwarding the assignment 2 file. Make this one on the basis of that assignment. This is the 3rd version of the same assignment.

Write a Review

Computer Network Security Questions & Answers

  What types of information could be used

What types of information could be used? What does this use suggest to you about the content and detail of such information?

  What hardware-cabling-software would you need

If you have physical access to the Cisco network appliance (picture right) and it is functioning as normal, what can be an avenue of approach to access.

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  Mobile computing has dramatically changed how information

mobile computing has dramatically changed how information is accessed and shared. wireless networking has been an

  Assignment Topic - Data Loss Prevention in Endpoint Devices

Required to research current literature on your topic - Data Loss Prevention in Endpoint Devices (e.g usb drive, hard drive, etc.)

  What are some common lan and lan-to-wan domain policies

Over the last eight weeks you have learned about many different policies and how to use them to strengthen an organization's security posture.

  The author of your text suggests that the ability to

the author of your text suggests that the ability to connect to the internet via wi-fi is available everywhere bowles

  Develop a network security policy for a global organization

Develop a network security policy for a global organization. The security was violated in different situations. There are various elements in which need to be discussed and researched to design and outline the policy.

  Describe the steps that can be taken to protect a pc

Describe the steps that can be taken to protect a PC against ransomware and determine if a particular OS is more secure against these types of attacks.

  How do tables track the state and context of exchange packet

What are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  How attack can be foiled by checking source port numbers

Explain how the attack (described in Topic 1) can be foiled by checking the source port numbers. Please describe the enforced rule(s)

  Describe worst practices that avoided when selecting an epp

Name and briefly describe three "best practices" that should be used when acquiring (purchasing) an EPP. Name and briefly describe three "worst practices" that should be avoided when selecting an EPP.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd